Shauren
623202d68e
Core/Bnet: Implemented new SRP6 variants, and migrate old sha_pass_hash in battlenet_accounts to separate salt and verifier columns
...
* passwords can now be case sensitive and up to 128 characters long
2023-12-26 14:55:15 +01:00
Shauren
e172052a0a
Core/Crypto: Added SHA 512 definitions
2023-12-19 21:13:33 +01:00
Shauren
acb5fbd48b
Core/Bnet: Rewrite LoginRESTService using boost::beast instead of gsoap as http backend and extract generic http code to be reusable elsewhere
2023-12-17 23:21:10 +01:00
Shauren
1fe73cd532
Core/SSL: Support more certificate formats
2023-09-16 00:41:07 +02:00
Shauren
f0a862e71b
Core/Misc: Modernize comparison operators
2023-08-24 00:51:26 +02:00
Shauren
7395d75b5a
Core/Misc: Fixed clang 15 warnings
2023-01-31 18:51:31 +01:00
Shauren
b8f18fad29
Core/Crypto: Remove support for OpenSSL 1.0
2022-09-06 12:51:08 +02:00
daMaex
4d1ae6cf06
Core/Crypto: Fixed build with openssl 1.1
...
(cherry picked from commit 9368823c8d )
2022-09-05 18:49:13 +02:00
Shauren
3fa46c6dc1
Core/Crypto: Fixed loading legacy openssl provider for RC4 on windows
2022-09-05 18:48:43 +02:00
daMaex
13c44517da
Core/Crypto: Updated ARC4 code with openssl 3.0 support
...
(cherry picked from commit 9fca5e9117 )
2022-09-05 18:44:05 +02:00
Shauren
72264f1d79
Core/Crypto: Removed unneccessary std::reverse in Ed25519::Sign
2022-08-01 11:54:51 +02:00
Shauren
ed2a2f032a
Core/Crypto: Added Ed25519 implementation
2022-08-01 00:12:47 +02:00
Shauren
758580c076
Core/Crypto: Fixed openssl 3.0 compatibility for custom hmac_sha256 digest for RSA
2022-06-17 15:37:47 +02:00
daMaex
71efb44dbd
Core/Crypto: Fixed GenericHMAC::Finalize wth openssl 3.0
...
(cherry picked from commit 0b6f77a006 )
2022-06-16 13:53:26 +02:00
Shauren
aa6a0f2431
Core/Crypto: Fixed EVP_PKEY reference counting for copied objects
...
Closes #27943
2022-05-06 12:21:59 +02:00
Shauren
849999c1b3
Codestyle fix - remove empty lines
2022-05-03 17:57:51 +02:00
Shauren
2345b33669
Core/Crypto: Fix nopch build
2022-05-03 17:51:47 +02:00
Shauren
bc87f7b337
Core/Crypto: Switch away from most deprecated openssl functions and removed upper version limit
2022-05-03 17:03:57 +02:00
Shauren
aefce9a25c
Core/Misc: Prefix include guard to avoid possible conflict with external library
2022-05-03 11:16:35 +02:00
Shauren
439b027d48
Core/Misc: Cleanup unused includes
2022-02-13 15:07:00 +01:00
Treeston
e0e3bae82c
Core/Authserver: Removal of sha_pass_hash, compatibility fields, and everything that uses them (PR #25156 )
...
(cherry picked from commit bcdbdd6f23 )
2022-02-05 13:29:21 +01:00
Shauren
cacdb57c9c
Core/Crypto: c++17-ify crypto code cherry picked earlier that was downgraded to c++14
2022-01-23 23:49:34 +01:00
Peter Keresztes Schmidt
10f835b058
Common/Crypto: #ifdef out unnecessary locking code for OpenSSL 1.1+ (PR #25110 )
...
(cherry picked from commit 7ea33120a0 )
2022-01-23 23:07:33 +01:00
Treeston
ea0aa63d96
Core/Misc: C++17 cleanups, commit 2, the advstd commit
...
(cherry picked from commit 857f8d9231 )
2021-12-24 00:37:21 +01:00
Shauren
2c78f4dd1f
Core/Misc: Resolve c++17 TODOs left in code as comments
2021-12-21 18:29:52 +01:00
Treeston
0b61c3b7b1
[3.3.5] Core/Authserver: TOTP rewrite: (PR #23633 )
...
- Proper management commands (.account 2fa)
- Secrets can now be encrypted (set TOTPTokenSecret in .conf)
- Secret now stored in binary
- Argon2 and AES primitives
- Base32/64 support
(cherry picked from commit 4211645834 )
2021-12-18 20:24:50 +01:00
Shauren
73e6cf4d27
Core/Misc: Fix another gcc warning
2021-10-06 12:19:05 +02:00
Treeston
ad7ed86aad
Common/Misc: Clean-up a GCC sign comparison warning
...
(cherry picked from commit 643b9209f8 )
2021-10-06 11:45:54 +02:00
Shauren
55eef73c48
Core/PacketIO: Increase max allowed incoming packet size for CMSG_HOTFIX_REQUEST
2021-03-02 01:06:28 +01:00
Shauren
b231903932
Core/Misc: Port all the refactors sneaked in master to 3.3.5 include cleanup port
2020-09-04 13:38:24 +02:00
Shauren
1c52d5fff7
Core/Misc: Replace NULL with nullptr
2020-08-14 17:06:03 +02:00
Treeston
73922d2a85
Core/Authserver: Re-organize the accounts table (PR #25135 )
...
- no longer use sha_pass_hash for anything else core-side (.account, SOAP, RA)
- salt/verifier/session_key are now binary
- old s/v/sha_pass_hash fields kept around for backwards compatibility
- sha_pass_hash is still updated (for now), s/v are not
- sha_pass_hash is only read if s/v have been manually changed
- SRP6 b now uses the full 32 bytes of randomness (instead of randomly only using 19)
(cherry picked from commit 3164b58c7d )
2020-08-03 22:37:47 +02:00
Treeston
77380f032b
Core/Authserver: Split SRP6 into its own file (PR #25131 )
...
(cherry picked from commit 7f7fa8b23d )
2020-08-03 21:16:30 +02:00
Treeston
ac37ca040b
how does VC++ never catch these? 5e36bf7 follow-up
...
(No more witty one-liners. Let me go to bed please.)
(cherry picked from commit 35411e5ed9 )
2020-08-03 19:47:19 +02:00
Treeston
287e18a57c
Core/Authserver: Auth cleanup phase 1b, the "I didn't hit Stage All" commit. Sorry. ( 5e36bf7 follow-up)
...
(cherry picked from commit 4f570e5d08 )
2020-08-03 19:45:11 +02:00
Treeston
059bd630e9
Core/Authserver: Auth cleanup phase 1a, the "stuff I ran across while making phase 2" commit.
...
- Did you know BigNumber quietly assumes every byte array it gets is little-endian, even though openssl bignums use big-endian? Now you do!
- In entirely unrelated news, make the above behavior explicit through a default-true boolean, same as existing GetBytes derivatives.
- Also, if you are in the enlightened openssl 1.1 crowd, there's no more endian wrangling involved, because openssl now does all of that for us. Progress!
(cherry picked from commit 5e36bf7c67 )
2020-08-03 19:41:41 +02:00
Treeston
e9392ad287
Core/Authserver: Authserver cleanup (PR#25093)
...
- Fix a handful of 1/256 bugs with most significant byte zero in BigNumber
- Get rid of (most of) the C-style arrays in authserver
- CryptoRandom as a unified source for cryptographic randomness
- Bring our other crypto APIs into 2020
- BigNumber usability improvements
- Authserver is now actually readable as a result of all of the above
(cherry picked from commit 210176fd91 )
2020-08-03 19:39:00 +02:00
Aokromes
b0bf1275ee
New Year
2020-01-02 06:44:10 +01:00
Shauren
aa64226b64
Core/Misc: Suppress openssl random generator uninitialized variable errors under valgrind
2019-11-08 20:17:59 +01:00
Shauren
3bb26a04f2
Core/PacketIO: Fix sending uninitialized data
2019-07-16 20:39:25 +02:00
Shauren
ce1091cf88
Fix build for openssl 1.0
2019-07-14 19:32:31 +02:00
Shauren
74a801182a
Core/PacketIO: Updated packet encryption to 8.2
2019-07-14 19:20:45 +02:00
vincent-michael
5620eb9463
Update copyright note for 2019
...
auto happy = new year(2019);
2019-01-01 10:14:33 +01:00
Shauren
e9bcae1fad
Core/Misc: Fixed nopch and clang 6.0 warnings
2018-12-09 16:07:38 +01:00
Warlockbugs
87bd1126ff
Core/Crypto: Transitional Cryptography update for OpenSSL 1.1 ( #21534 )
...
Support for both OpenSSL 1.0 LTS and OpenSSL 1.1 versions.
Many Linux distributions are still on 1.0 and will stay on LTS for quite
some time.
Port of CMaNGOS commit: e1b0048f05
2018-03-04 15:26:08 +01:00
vincent-michael
7d00ae4045
Update copyright note for 2018
...
auto happy = new year(2018);
2018-01-01 00:40:17 +01:00
Shauren
b49fa9658a
Tools/Patcher: Properly sign certificate bundle
2017-12-29 12:50:12 +01:00
Shauren
b54d1ab35f
Core/Crypto: Remove unused declaration
2017-12-26 01:42:38 +01:00
Shauren
130d3eb0ae
Core/Crypto: Add const_cast hack to fix linux build with openssl
2017-12-26 01:37:02 +01:00
Shauren
2628daadeb
Nopch build fix2
2017-12-25 21:51:20 +01:00